The Complete Cyber Security Course Hackers Exposed!
Categories:Mobile DevelopmentSoftware Development
This course includes
- Course Content
- Description
- What To Learn
- Materials Included
- Requirements
- Target Audience
Welcome and Introduction to the Instructor! 2:06
Goals and Learning Objectives - Volume 1 2:30
Cyber Security and Ethical Hacking Careers 3:45
Goals and Learning Objectives 00:41
What is Privacy, Anonymity and Pseudonymity 4:35
Security, Vulnerabilities, Threats and Adversaries 4:37
Threat Modeling and Risk Assessments 7:51
Security vs Privacy vs Anonymity - Can we have it all 1:56
Confidentiality, Integrity and Availability - (Security Attributes) 9:22
Goals and Learning Objectives 00:43
Why You Need Security – The Value Of A Hack 5:14
The Top 3 Things You Need To Stay Safe Online 1:23
Security Bugs and Vulnerabilities - The Vulnerability Landscape 9:35
Hackers, crackers and cyber criminals 2:32
Malware, viruses, rootkits and RATs 6:52
Spyware, Adware, Scareware, PUPs & Browser hijacking 4:44
What is Phishing, Vishing and SMShing 15:06
Social engineering - Scams, cons, tricks and fraud 5:31
CPU Hijackers - Crypto Mining Malware and Cryptojackers 8:42
Darknets, Dark Markets and Exploit kits 8:01
Governments, spies and secret stuff part I 5:13
Governments, spies and secret stuff part II 10:35
Regulating encryption, mandating insecurity & legalizing spying 14:37
Cyber Threat Intelligence – Stay Informed 1:12
Goals and Learning Objectives 00:24
Secure Sockets Layer (SSL) and Transport layer security (TLS) 13:26
Certificate Authorities and HTTPS 14:07
End-to-End Encryption (E2EE) 1:57
How Security and Encryption is Really Attacked 2:42
Goals and Learning Objectives 00:28
Introduction to Setting up a Testing Environment Using Virtual Machines 10:01
Goals and Learning Objectives 00:37
Security Features and Functionality 5:56
Security Bugs and Vulnerabilities 5:31
windows 10 - Privacy & Tracking 6:08
Windows 10 - Disable tracking automatically 4:42
Windows 10 - Tool Disable Windows 10 Tracking 8:14
Windows 10 – Privacy Settings 9:40
Windows 7, 8 and 8.1 - Privacy & Tracking 7:19
Linux and Unix “like” Operating systems 3:30
General Use Operating Systems (Windows, MacOS and Linux) 4:09
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch) 5:04
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS) 2:55
Anonymity Focused Operating Systems (Tails and Whonix OS) 2:56
Penetration Testing and Ethical Hacking Focused Operating Systems 00:49
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish) 2:31
Linux - Debian 8 Jessie - Virtual box guest additions Issue 6:26
Goals and Learning Objectives 00:25
The Importance of Patching 3:47
Windows - Criticality and Patch Tuesday 3:46
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching 8:34
Linux - Debian - Patching 10:58
Firefox - Browser and extension updates 4:23
Chrome - Browser and extension updates 1:13
IE and Edge - Browser and extention updates 00:46
Auto updates - The Impact to privacy and anonymity 1:41
Goals and Learning Objectives - Removing Privilege 2:53
Windows 7 - Not using admin 3:32
Windows 8 and 8.1 - Not using admin 4:15
Windows 10 - Not using admin 3:25
Goals and Learning Objectives 00:26
Information Disclosure and Identity Strategies for Social Media 12:34
Identify Verification and Registration 5:05
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2 10:22
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons) 5:02
Goals and Learning Objectives 00:21
Introduction to Isolation and Compartmentalization 2:10
Physical and Hardware Isolation - How to change the Mac Address 7:10
Physical and Hardware Isolation - Hardware Serials 11:18
Built-in Sandboxes and Application Isolation 3:07
Windows - Sandboxes and Application Isolation 5:57
Windows - Sandboxes and Application Isolation - Sandboxie 11:29
Linux - Sandboxes and Application Isolation 3:04
Mac - Sandboxes and Application Isolation 6:34
Virtual Machine Weaknesses 10:31
Virtual Machine Hardening 9:15
Security Domains, Isolation and Compartmentalization 4:42
Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys) 16:23
Sample from Vol 2 - Password cracking part 2 7:09
Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3 15:21
Sample from Vol 4 - Email clients, protocols and authentication 13:17